AU2012271443B2 - System and method for accessing a structure using directional antennas and a wireless token - Google Patents
System and method for accessing a structure using directional antennas and a wireless token Download PDFInfo
- Publication number
- AU2012271443B2 AU2012271443B2 AU2012271443A AU2012271443A AU2012271443B2 AU 2012271443 B2 AU2012271443 B2 AU 2012271443B2 AU 2012271443 A AU2012271443 A AU 2012271443A AU 2012271443 A AU2012271443 A AU 2012271443A AU 2012271443 B2 AU2012271443 B2 AU 2012271443B2
- Authority
- AU
- Australia
- Prior art keywords
- access
- wireless
- user device
- short
- access system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
- 238000000034 method Methods 0.000 title claims description 34
- 230000004044 response Effects 0.000 claims description 6
- 230000005540 biological transmission Effects 0.000 claims description 4
- 238000004891 communication Methods 0.000 abstract description 5
- 230000000903 blocking effect Effects 0.000 abstract 1
- 230000008569 process Effects 0.000 description 18
- 238000013475 authorization Methods 0.000 description 8
- 238000012790 confirmation Methods 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/084—Access security using delegated authorisation, e.g. open authorisation [OAuth] protocol
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/088—Access security using filters or firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/33—Services specially adapted for particular environments, situations or purposes for indoor environments, e.g. buildings
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
- H04W48/04—Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction, speed
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A wireless device access system that employs directional antennas for short-range wireless communication to detect the proximity and orientation of a user device with respect to a structure is disclosed. The access system receives and authenticates an unlock request and confirms the proximity and orientation of the user device prior to transmitting an unlock command to the structure. Additionally, the wireless device may require the proximity of a user token prior to operation and/or the access system may include an override within the structure blocking any unlock command.
Description
WO 20121174387 PCT/US2012/042683 1 SYSTEM AND METHOD FOR ACCESSING A STRUCTURE USING DIRECTIONAL ANTENNAS AND A WIRELESS TOKEN CROSS REFERENCE TO RELATED APPLICATIONS 5 The present application claims the benefit of United States Provisional Patent Application Serial No. 61/498,169 filed June 17, 2011 entitled "A System and Method for Accessing a Structure using Directional Antennas and a Wireless Token" which is hereby incorporated by reference in its entirety to the extent not 10 inconsistent. FIELD OF THE INVENTION The present invention generally relates to an access system including a wireless token and a proximity and location verification device. More particularly, 15 the present invention pertains to a three point access system which includes a wireless token which transmits a request for access which ultimately results in a door being unlocked. SUMMARY 20 Disclosed is a wireless device access system which employs short-range wireless communication and one or more directional antennas to require the presence of a user device within a designated area proximate to an entry point of a structure prior to providing access to the structure. The access system includes a wireless node having a wireless transmission area proximate to or covering the 25 entry point which authenticates a user device for a certain structure when the user device comes within range of the wireless node. In response to authenticating the user device, the wireless node sends a wake-up signal to an access device associated with the certain structure, such as a lock on an entry point. In response to the wake-up command, the access device will remain active for a predetermined 30 but limited period of time so as to be available to communicate with a user device. Additionally, in some forms, the wake-up command may also issue a notification triggering an in-room system to prepare the room, such as by turning on the lights or other user specified actions. In a further form, the wake-up command may 2 include a temporary security code for verifying an unlock command sent by a user device. When the user device comes within range of the recently activated access device, provided that the access device is still active, the user device will communicate its credential information to the access device for confirmation. 5 In addition, the access device utilizes a pair of directional antennas to confirm that the requesting user device is within a designated area, such as a 2 foot semi circular area outside of a door. Such a location confirmation ensures that access to a structure won't ever be improperly granted based upon a user device within the structure. Upon confirming the authorization associated with the provided 10 access code and confirming that the user device is within the designated area, the access device grants the user access to the structure by unlocking the entry. According to one aspect, there is provided an access system allowing a user to access an enclosed area using a wireless user device, the access system comprising: a database storing access permissions identifying at least one 15 wireless user device authorized to access said enclosed area; a mechanical locking device securing a point of entry to said enclosed area, said locking device operably connected to at least one short-range wireless receiver suitable for receiving an unlock request from said wireless user device and subsequently responding by granting access through said point of entry when said unlock 20 request is authorized using said database, wherein said at least one short-range wireless receiver includes a first and second directional antenna which are mounted to said point of entry and oriented such that the centers of their fields of reception are offset by an angle of at least 130 degrees, and wherein said authorizing requires a comparison of the received signal strength indicator of 25 said first directional antenna to that of said second directional antenna. According to another aspect, there is provided a method for granting access to an enclosed area based on a wireless user device, the method comprising the steps of. maintaining a database storing access permissions identifying at least one wireless user device authorized to access one or more 30 enclosed areas; receiving a first unlock request for an identified enclosed area at an access node from a wireless user device, wherein at least one point of entry of said enclosed area is within the transmission range of said access node; authenticating at least a portion of said unlock request using a said database; transmitting a wake-up request and an access code from said access node to a [10342959 41:wxb 2a short range wireless radio connected to said mechanical locking device securing a point of entry to said identified enclosed area; receiving a second unlock request at said short range wireless radio from a wireless user device, wherein said second unlock request includes a security code; unlocking said mechanical 5 lock device to provide access to said enclosed area in the event said security code matches said access code; and determining a received signal strength indicator for said wireless user device for each of a first and second directional antenna positioned near said point of entry, wherein the centers of the fields of reception of said first and said second directional antennas are offset by an 10 angle of at least 130 degrees and wherein said unlocking requires that the ratio of said first and said second received signal strength indicators indicates that said wireless user device is outside of said enclosed area. According to another aspect, there is provided an access system allowing a user to access a structure using a wireless user device, the access system 15 comprising a database storing access permissions identifying at least one wireless user device authorized to access said structure and one access node authorized to permit access to said structure; a mechanical locking device securing a door of said structure, said locking device having at least one short range wireless receiver suitable for receiving and authenticating an unlock 20 command for a predetermined time after the receipt of a wireless wake-up command and responding to a properly authenticated unlock command by unlocking said door; wherein said at least one short-range wireless receiver includes a first and second directional antenna which are mounted to said door and oriented such that the centers of their fields of reception are offset by an 25 angle of at least 130 degrees, and wherein said authorizing requires a comparison of the received signal strength indicator of said first directional antenna to that of said second directional antenna; and an access node positioned near said structure comprising: a first short-range wireless radio for receiving a wireless access request directly from a wireless user device; and a 30 second short-range wireless radio for transmitting a wake-up command to said mechanical locking device in response to receiving an authorized request. [THE NEXT PAGE IS PAGE 31 [10342959 41:wxb WO 2012/174387 PCT/US2012/042683 3 BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a diagrammatic view of an access system according to one implementation of the present invention. FG. 2 is a process flow diagram illustrating one set of steps performed in 5 enabling a user to access a structure using the novel access system, including a wireless token. FIG. 3 is a mock floor plan illustrating the coverage areas of the access node and the two door lock antennas in a typical multi-room hotel setting.
WO 2012/174387 PCT/US2012/042683 4 DETAILED DESCRIPTION For the purposes of promoting and understanding of the principles of the invention, reference will now be made to the embodiment illustrated in the drawings and specific language will be used to describe the same. It will 5 nevertheless be understood that no limitation of the scope of the invention is thereby intended. Any alterations and further modifications in the described embodiments, and any further applications of the principles of the invention as described herein are contemplated as would normally occur to one skilled in the art to which the invention relates. 10 Currently, systems exist, such as the Signature RFID/NFC system from VingCard, which provide a user access to a hotel room using their mobile phone. Alternatively, other point-to-point systems exist which provide access to an office, lab, or other secured area using a wireless token, such as an RFID tag or card. However, such systems are limited in that the token is limited to a single identifier 15 which leaves open a crucial security flaw which would allow for duplication of the token's responsive signal. Additionally, given the wireless range of these tokens, an undesirable situation may arise in which the token is within range of the lock or RFID reader when inside of the secured area. This presents the possibility that access may be granted to anyone seeking entry at that time. 20 As shown in FIG. 1, one embodiment of an access system 20 advantageously permits a user to access a structure 40 using a wireless token 24. In addition to lodging and workplace access systems, it will be appreciated that similar embodiments of the access system to be described also encompass systems for controlling access to other structures or openings/doors thereof. In particular, 25 the access system 20 is particularly well suited to providing access to structures in which the authorized users are frequently changes, such as a hotel. As such, in the illustrated embodiment, according to FIG. 1, the described system comprises an access system 20 for allowing a hotel guest to access their assigned hotel room 40 using a wireless token 24, which in the preferred form, is an electronic device 30 capable of short range wireless communication, such as a device implementing Bluetooth®, Zigbee®, or some other low-power wireless communication protocol/standard. It shall be understood that many of the descriptions herein are made with respect to a hotel environment and are meant for illustrative purposes WO 2012/174387 PCT/US2012/042683 5 and that the concepts herein are generally applicable to a general safety and security access system and are not limited to only a hotel room access system. Examples of other structures for which the novel access system may be adapted include other rooms within a hotel (i.e. workout rooms, pools, VIP 5 lounges), office buildings, school/university buildings, laboratories, warehouses, and portions thereof, event ticket gates/turnstiles, movie theatres, safety deposit boxes, mailboxes, lockers, or other enclosures for which providing selective user access is desired. As shown in FIG. 1, according to the illustrative embodiment, the access 10 system 20 includes one or more wireless tokens 24 which allow a user to access their assigned hotel room without a traditional key or card. Illustratively, in some embodiments, the access system 20 includes a data network 54. Data network 54 is preferably a private local area network (LAN) and may comprise the Internet, which is a TCP/IP based global network; however, the user of the term "Internet" 15 herein shall be understood to refer to at least a portion of any public interconnected electronic network which interchanges data by packet-switching. Access system 20 additionally comprises a mechanical lock 34 for locking and unlocking a structure 40 (partially shown). In the illustrated embodiment, a user gains access to the structure 40 via door 32. In the illustrative embodiment, 20 mechanical lock 34 is a mechanical door lock, which includes a locking mechanism similar to a common entry or exterior lock, but is further capable of self-unlocking in response to an electronic signal, in addition to other functionality described herein. For purposes of non-limiting example, mechanical lock 34 may include a cam lock, rotary latch, electro-mechanical lock, magnetic lock, or the 25 like. According to the preferred form, lock 34 unlocks in response to an electrical signal sent from a wireless token 24 and/or access node 50. In one form, the electrical signal is sent wirelessly, such as over a low-power RF connection, such as a Zigbee@ connection. In a further preferred form, the lock 34 returns to a locked state following the passage of a predetermined time period or a user 30 opening and closing the door following the receipt of an unlock signal. In some additional forms, lock 34 or door 40 may also include a mechanical key slot, key card, or other entry permitting authentication means 36 in addition to, or as backup for, that described herein with respect to lock 34. In addition, it shall be WO 2012/174387 PCT/US2012/042683 6 appreciated that system 20 may be applied to access restrictions other than locks including, for example, an elevator control system providing limited access, a garage door, or others access barriers, as described later. Access system 20 also utilizes at least one access node 50 to interface with 5 wireless token 24 and lock 34. Access node 50, as illustrated, is a wireless node implementing a common short-range wireless standard, such as Bluetooth@ or ZigBee@, to those implemented by wireless token 24 and lock 34. Access node 50 is also connected to server 60 via firewall 52 and network 54. In the illustrative form, access system 20 includes a plurality of access 10 nodes, such as access node 50, where each node is strategically positioned near a specified structure (i.e. a hotel room). The access nodes are preferably always in a active mode so that wireless tokens 24 may be connected with them on demand in the event the wireless token 24 is authorized, such as by having an authorized MAC address or some other selected security mechanism. In a further form, the 15 access nodes 50 are not in a discoverable mode and the pairing of the access nodes 50 with wireless token 24 occurs prior to the user's arrival programmatically. Illustratively, in some embodiments, access node 50 is operatively connected to server 60 to process and authenticate electronic unlock requests from wireless tokens 24. Firewall 52 includes at least a hardware or software implemented 20 firewall or other selected security features to prevent external access to server 60 or access node 50. The location information maintained by access node 50 is linked to the present/assigned location of the node and is used in processing any unlock request. For example, an access node on the fourth floor of a hotel in downtown Chicago 25 may be assigned a unique hotel identifier coupled with a hotel zone identifier. Alternatively, the node may be assigned a single identifier which is then linked to its location by the wireless token 24 or server 60. For purposes of illustrating the hierarchical relationship between access nodes 50 and the structures which fall within their range, a mock floor plan is shown in FIG 3. The mock floor plan 30 illustrates a number of complete circles which denote the wireless range of a number of access nodes 50 for purposes of covering the entryway/hallway of a hotel floor and one or more doors.
WO 2012/174387 PCT/US2012/042683 7 According to the illustrated embodiment, server 60 operates in conjunction with access node 50 over internal network 54 to authenticate any wireless token 24 which comes within its range. In one form, when a wireless token 24 comes within range of an access node 50, the access node 50 receives information from the 5 wireless token 24 and seeks to identify one or more structures within its coverage area to which the wireless token 24 is authorized to enter. The server 60 serves to authenticate the request or a portion thereof using a reservations and occupancy database, while in other forms, the access node 50 may perform at least a portion of the authentication. In the illustrative embodiment, server 60 processes each 10 request corresponding to an authentication request received by access node 50 from wireless token 24, and upon proper authentication, confirms the authentication for one or more structures to access node 50 which then transmits an electronic signal to the corresponding lock(s), such as lock 34, notifying the lock to wake-up for a predetermined period of time in order to communication with nearby 15 authorized wireless token 24. In a further form, the access node 50 not only notifies lock 34 that it should wake-up, but also communicates information to lock 34 regarding which wireless token 24 it should be expecting. While server 60 is described and illustrated as being a server, it should be understood that server 60 may be any computer, including a client server 20 arrangement. Server 60 may interface with access node 50 by either a wireless or hardwired interconnection. Preferably, the connection is a secured connection. A non-limiting example list of potential interfaces includes IR, optical, RF, serial port, IP network, and USB. Additionally, the functions of server 60 and access node 50 may be integrated into one computer system. 25 Once access node 50 as authenticated wireless token 24 and woken-up a selected lock 34, the process proceeds to a second level authentication between the wireless token 24 and lock 34. In the illustrated embodiment, wireless token 24 connects to lock 34 and provides authorization information. In one form, the authorization information provided may be the same as the authorization 30 information provided by wireless token 24 to access node 50, described above. Alternatively, in another form, the authorization information provided by wireless node 24 may be unlock information provided to wireless node 24 by access node 50 earlier in the process. Furthermore, in this form as well as other, upon receiving WO 2012/174387 PCT/US2012/042683 8 the authorization information from wireless token 24, lock 34 may communicate with access node 50 to confirm the authorization or wireless token 24. In the event the authorization information received by lock 34 is authorized, by whatever means selected, lock 34 determines that a legitimate unlock request is present. 5 Additionally, either prior to or simultaneous with, lock 34 assesses the location of wireless token 24 to detennine whether it is within a designated area. For making this determination, lock 34 includes two directional antennas 38 and 39 which are operable to communicate with wireless token 24 over a low power wireless transmission protocol. As illustrated in FIG. 1, according to the illustrated 10 form, lock 34 and antennas 38 and 39 are located within the mortise of door 32. According to the described form, antenna 38 faces outward from door 32 and structure 40 while antenna 39 faces inward from door 32 and into structure 40. These antennas enable lock 34 to determine an approximate location of wireless token 24 with respect to door 32 (i.e. inside or outside of structure 40) based upon 15 a received signal strength indication (RSSI) determined by each of directional antennas 38 and 39. Furthermore, lock 34 can confirm that the requesting user device is within a designated area, such as an 2 foot semi-circular area on the outside of a door, based upon the signal strength received as well as the differential of the signal strength between the two opposite facing directional antennas. Such a 20 confirmation ensures that access to a structure won't ever be improperly granted based upon a user device within the structure. For example, the mock floor plan shown in FIG. 3 illustrates a number of desired areas as small half circles outside of hotel room doors, which area the effective coverage areas for the required signal strength to be detected by antenna 38 with respect to wireless token 24. It is only 25 when a wireless token 24 is within these areas that their respective doors may be opened if authorized. Furthermore, a number of larger half circles in the interior of the hotel rooms show the field of coverage of antennas 39 which are used to detect when wireless token is within the corresponding hotel room. Only after the authentication information received from wireless token 24 30 is verified and the location of wireless token 24 has been determined to be in the designated area will lock 34 unlock to permit the user access to the structure. In still other embodiments, lock 34 is operably coupled to an override switch (not shown) having an access disable state. Asserting the override switch WO 2012/174387 PCT/US2012/042683 9 prevents the access system 20 from permitting access to corresponding structure 40. As one non-limiting example, the override switch may be asserted when a guest engages a deadbolt or bar latch within their hotel room. In some embodiments of the access system 20, the override switch is incorporated into an 5 electronic control, not shown here, accessible to the user within structure 40. A flowchart illustrating one set of steps performed in configuring a wireless token 24 for use in accessing a structure 40 according to one embodiment of the present invention is shown in FIG. 2. The process involves a wireless token 24 and the various other components of access system 20. The following description is 10 with continuing reference to access system 20 of FIG. 1. As shown in FIG. 1, the wireless token 24 may be a dedicated wireless token or another device, such as a mobile telephone, laptop, tablet, or other portable electronic device; however, it is understood that numerous other networked appliances are also intended. It shall be appreciated that initial reservation, check-in, and configuration 15 information must be populated within server 60 to enable to access methods described herein to be performed. For example, confirmation information stored by server 60 preferably identifies the hotel and the user and includes a check in/check-out date along with details of the type of room requested/reserved. In the preferred form, this confirmation information is received by server 60 as a result of 20 a hotel booking being made for a user either online, in person, or over the phone. Upon checking into the hotel, or being authorized to access some other structure in other adaptations of the system 20, the wireless token 24 is automatically configured to pair with or otherwise connect to access nodes located near the structure 40. Additionally, the details of the assigned room or structure, 25 including its number and location, are then stored by server 60 is association with wireless token 24. This ensures that access nodes 50 will proper identify the room wireless token 24 is assigned to access and be able to authenticate its request for access. It shall be appreciated that this process may be modified to accommodate more than one authorized hotel guest per room, such as having two wireless 30 devices authorized to enter the same hotel room, or allowing a current guest to authorize the wireless device of another to access the hotel room for any portion of their remaining stay.
WO 2012/174387 PCT/US2012/042683 10 In continuing the description of the embodiment described with respect to FIG. 2, a flowchart illustrating one set of steps performed in allowing a user to access structure 40 using wireless token 24 and the various other components of access system 20 is shown. The following description is with continuing reference 5 to access system 20 of FIG. 1 As shown in FIG. 2, the process begins at start point 200 with the user along with the wireless token 24 arriving in a location within range of an access node 50. In step 202 or 204, a user device, such as either a mobile telephone or wireless token 24, are detected by the access node 50 respectively. Upon detecting 10 the user device, the access node determines whether or not the user is authorized to enter one of the structure entrances that is proximate to access node 50 (step 206). If the user is not authorized, the process ends at point 208. If the user is authorized, the user device connects to the access node 50 (step 210). Next, in order to ensure that the user is on the proper floor, the access node 50 compares its 15 perceived signal strength from the nearest access nodes of the floor above and below (if available) to ensure that its signal is the strongest (step 212). If the user is determined to be on another floor, the process proceeds to and ends at step 214. Alternatively, if the access node 50 determines that the user is on its associated floor, the process proceeds to step 216. In step 216 the access node 50 collaborates 20 with server 60 to confirm the credentials provided by the user device. In the event the credentials are not confirmed, the process ends at step 218. If the credentials of the user device are confirmed, the process proceeds to step 220 where access node 50 sends a wake-up signal to the lock, such as lock 34, associated with the structure, such as structure 40, to which the user is authorized. Additionally, the 25 access node 50 may detect the type of wireless standard the user device is capable of such that the proper wireless standard may be activated by the selected door lock 34 in step 220. The wake-up signal may also include an access code, such as a temporary alphanumeric code or the like, which must be matched by the user device in order to cause the lock to open. 30 The second stage of the process beings in step 226 where the user device connects to the now active lock 34. The dual antennas 38 and 39 of lock 34 detect a RSSI from the user device (step 228). In the preferred form, the central focus of the antennas 38 and 39 are directly opposite of one another. However, in an WO 2012/174387 PCT/US2012/042683 11 alternate form, the central focus of the antennas 38 and 39 may only be offset by at least 130 degrees. In yet another form, the central focus may differ by 150 degrees or more. If the user device is determined to be inside of the structure, such as by having a stronger signal strength via the internally facing antenna 39, the process 5 proceeds through steps 232, and 234, whereby it is determined that the user is already in the room and the process ends subject to starting over. Alternatively, if is determined to be outside of the structure, such as by having a stronger signal strength via the externally facing antenna 38 or a suitable ration, and at least a certain signal strength to indicate the desired proximity to lock 34 (step 236), the 10 process proceeds to authenticate the request by comparing the security code provided by the user device to the stored access code received from node 50 (step 238) until lock 34 unlocks either provides the user with access to structure 40 (step 240) upon a successful authentication or the process ends at point 242. In a further form, door lock 34 takes appropriate samples of RSSI relative 15 to wireless token 24 on either side of door, using antennas 38 and 39. For example, the samples may include several periodic RSSI readings which are then averaged or otherwise combine to reduce interference, noise, or the like from a single reading. Based upon these readings, lock 34 makes a determination of whether wireless token 24 is inside and outside of door 32. Additionally, the lock 20 34 may use the RSSI samples of antenna 38 to determine the distance wireless token 24 is from lock 34 for purposes of determining its presence within the defined proximity range outside of the door 32 as well. Once measurements averages are conducted, and presence of token/device and it is determined that he is in the proper unlock zone (range of outside proximity), the unlock of step 242 is 25 granted. In yet another form, lock 34 may periodically transmit information to access node 50 for passing along to server 60 which indicates the user is still in the hotel room. This information may trigger the in-room temperature to be maintained, and upon detecting that the user is no longer in the room, the 30 temperature may be raised to a user-specified or standard level or it may trigger the lights to be turned off, as described in U.S. Patent Application 10/126,486 to Sunyich entitled "Personalized Smart Room", which is hereby incorporated by reference to the extent not inconsistent.
WO 2012/174387 PCT/US2012/042683 12 While the invention has been illustrated and described in detail in the drawings and foregoing description with respect to a hotel access system, the same is to be considered as illustrative and not restrictive in character, it being understood that only the preferred embodiment has been shown and described and 5 that all equivalents, changes, and modifications that come within the spirit of the inventions as described herein and/or by the following claims are desired to be protected. By way of non-limiting example, the system described herein may be applied to other enclosed areas where selective access is desired, including, other structures such as offices, amusement parks, military bases, restricted areas, 10 vehicles, homes, etc.
Claims (20)
1. An access system allowing a user to access an enclosed area using a wireless user device, the access system comprising: a database storing access permissions identifying at least one wireless user 5 device authorized to access said enclosed area; a mechanical locking device securing a point of entry to said enclosed area, said locking device operably connected to at least one short-range wireless receiver suitable for receiving an unlock request from said wireless user device and subsequently responding by granting access through said point of entry 10 when said unlock request is authorized using said database, wherein said at least one short-range wireless receiver includes a first and second directional antenna which are mounted to said point of entry and oriented such that the centers of their fields of reception are offset by an angle of at least 130 degrees, and 15 wherein said authorizing requires a comparison of the received signal strength indicator of said first directional antenna to that of said second directional antenna.
2. The access system according to claim 1, wherein said at least one short range wireless radio is a Bluetooth radio. 20
3. The access system according to claim 1, wherein the centers of the fields of reception of said first and said second directional antennas are offset by an angle of at least 150 degrees.
4. The access system according to claim 1, wherein said at least one short range wireless radio is an 802.11 radio. 25
5. The access system according to claim 1, wherein said enclosed area is a structure and said point of entry is a door.
6. The access system according to claim 5, wherein said mechanical locking device is located in the mortise of said door.
7. The access system according to claim 5, wherein at least one of said first 30 and said second directional antennas is located in the mortise of said door.
8. The access system according to claim 5, wherein said structure is a hotel room.
9. The access system according to claim 1, wherein said wireless user [10342959 41:wxb 14 device is a mobile telephone.
10. The access system according to claim 2, wherein said wireless user device is a mobile telephone.
11. A method for granting access to an enclosed area based on a wireless 5 user device, the method comprising the steps of: maintaining a database storing access permissions identifying at least one wireless user device authorized to access one or more enclosed areas; receiving a first unlock request for an identified enclosed area at an access node from a wireless user device, wherein at least one point of entry of said 10 enclosed area is within the transmission range of said access node; authenticating at least a portion of said unlock request using a said database; transmitting a wake-up request and an access code from said access node to a short range wireless radio connected to said mechanical locking device 15 securing a point of entry to said identified enclosed area; receiving a second unlock request at said short range wireless radio from a wireless user device, wherein said second unlock request includes a security code; unlocking said mechanical lock device to provide access to said enclosed 20 area in the event said security code matches said access code; and determining a received signal strength indicator for said wireless user device for each of a first and second directional antenna positioned near said point of entry, wherein the centers of the fields of reception of said first and said second 25 directional antennas are offset by an angle of at least 130 degrees; and wherein said unlocking requires that the ratio of said first and said second received signal strength indicators indicates that said wireless user device is outside of said enclosed area.
12. The method according to claim 11, wherein said at least one short-range 30 wireless radio is a Bluetooth radio.
13. The method according to claim 11, wherein said at least one short-range wireless radio is a 915 IMz radio.
14. The method according to claim 11, wherein said at least one short-range [10342959 41:wxb 15 wireless radio is an 802.11 radio.
15. The method according to claim 11, wherein the centers of the fields of reception of said first and said second directional antennas are offset by an angle of at least 150 degrees. 5
16. The method according to claim 11, wherein said enclosed area is a structure and said point of entry is a door.
17. The method according to claim 16, wherein said mechanical locking device is located in the mortise of said door.
18. The method according to claim 17, wherein at least one of said first and 10 said second directional antennas is located in the mortise of said door.
19. The method according to claim 11, wherein said wireless user device is a mobile telephone.
20. An access system allowing a user to access a structure using a wireless user device, the access system comprising: 15 a database storing access permissions identifying at least one wireless user device authorized to access said structure and one access node authorized to permit access to said structure; a mechanical locking device securing a door of said structure, said locking device having at least one short-range wireless receiver suitable for receiving 20 and authenticating an unlock command for a predetermined time after the receipt of a wireless wake-up command and responding to a properly authenticated unlock command by unlocking said door; wherein said at least one short-range wireless receiver includes a first and second directional antenna which are mounted to said door and 25 oriented such that the centers of their fields of reception are offset by an angle of at least 130 degrees, and wherein said authorizing requires a comparison of the received signal strength indicator of said first directional antenna to that of said second directional antenna; and an access node positioned near said 30 structure comprising: a first short-range wireless radio for receiving a wireless access request directly from a wireless user device; and a second short-range wireless radio for transmitting a wake-up [10342959 41:wxb 16 command to said mechanical locking device in response to receiving an authorized request. Yikes LLC 5 Patent Attorneys for the Applicant/Nominated Person SPRUSON & FERGUSON [10342959 41:wxb
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201161498169P | 2011-06-17 | 2011-06-17 | |
| US61/498,169 | 2011-06-17 | ||
| PCT/US2012/042683 WO2012174387A2 (en) | 2011-06-17 | 2012-06-15 | System and method for accessing a structure using directional antennas and a wireless token |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| AU2012271443A1 AU2012271443A1 (en) | 2014-02-06 |
| AU2012271443B2 true AU2012271443B2 (en) | 2016-05-12 |
Family
ID=47357768
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AU2012271443A Ceased AU2012271443B2 (en) | 2011-06-17 | 2012-06-15 | System and method for accessing a structure using directional antennas and a wireless token |
Country Status (7)
| Country | Link |
|---|---|
| US (1) | US20140125453A1 (en) |
| EP (1) | EP2721871B1 (en) |
| JP (1) | JP6552195B2 (en) |
| AU (1) | AU2012271443B2 (en) |
| CA (1) | CA2845510A1 (en) |
| ES (1) | ES2813355T3 (en) |
| WO (1) | WO2012174387A2 (en) |
Families Citing this family (31)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR101278974B1 (en) * | 2010-12-09 | 2013-07-02 | 주식회사 지트론 | Door lock system |
| JP5811274B2 (en) * | 2012-03-30 | 2015-11-11 | ソニー株式会社 | Terminal device, communication method, program, and communication system |
| US9485607B2 (en) * | 2013-05-14 | 2016-11-01 | Nokia Technologies Oy | Enhancing the security of short-range communication in connection with an access control device |
| US9888378B2 (en) * | 2013-06-27 | 2018-02-06 | International Business Machines Corporation | Associating a user identity to a wireless signal |
| US9373208B2 (en) * | 2013-09-11 | 2016-06-21 | Sony Corporation | Secure remote control for operating closures such as garage doors |
| US9948359B2 (en) * | 2013-09-20 | 2018-04-17 | At&T Intellectual Property I, L.P. | Secondary short-range wireless assist for wireless-based access control |
| FI125687B (en) * | 2013-10-01 | 2016-01-15 | Rollock Oy | Locking arrangement and method for determining the presence and position of a device transmitting a radio signal |
| US20150102903A1 (en) * | 2013-10-11 | 2015-04-16 | Wal-Mart Stores, Inc. | Secure Delivery Receptacle |
| US10126737B2 (en) | 2013-11-22 | 2018-11-13 | The Chamberlain Group, Inc. | Remotely operating a movable barrier operator with auxiliary device |
| SE538146C2 (en) * | 2013-12-06 | 2016-03-15 | Sweden Connectivity Ab | Passive locking system including means for inside and outside detection |
| JP6478484B2 (en) * | 2014-05-22 | 2019-03-06 | 三菱電機株式会社 | Electric lock system and electric lock system control method |
| US9337951B2 (en) | 2014-07-31 | 2016-05-10 | Yousef Dhahi ALONAZY | Device and method for limiting an extent of a wireless network service |
| EP3072754A1 (en) | 2015-03-27 | 2016-09-28 | Assa Abloy AB | Method, device, computer program and computer program product for determining whether a portable key device is located in an active area in relation to a barrier |
| EP3073284A1 (en) * | 2015-03-27 | 2016-09-28 | Assa Abloy AB | Method, device, computer program and computer program product for determining whether a portable key device is located in an active area in relation to a barrier |
| US9852561B2 (en) | 2015-05-18 | 2017-12-26 | Unikey Technologies Inc. | Wireless access control system for a door including proximity based lock disabling and related methods |
| US9613478B2 (en) | 2015-05-18 | 2017-04-04 | Unikey Technologies Inc. | Wireless access control system for a door including door position based authentication and related methods |
| US9858738B2 (en) | 2015-07-17 | 2018-01-02 | Wal-Mart Stores, Inc. | Apparatus and method to determine whether to unlock a delivered-package vault |
| CN105246030A (en) * | 2015-08-25 | 2016-01-13 | 深圳市一米阳光科技有限公司 | Automatic Bluetooth entrance/exit determination system and method |
| KR102326178B1 (en) * | 2015-11-23 | 2021-11-16 | 주식회사 슈프리마 | Method and system for managing a door entry using beacon signal |
| US9805533B2 (en) * | 2015-11-23 | 2017-10-31 | Suprema Inc. | Method and system for managing door access using beacon signal |
| US9697658B1 (en) * | 2015-12-28 | 2017-07-04 | Unikey Technologies Inc. | Wireless access control system including closed door position and interior area remote access wireless communications device based lock switching and related methods |
| US9697661B1 (en) * | 2015-12-28 | 2017-07-04 | Unikey Technologies Inc. | Wireless access control system including closed door position and exterior area remote access wireless communications device based lock switching and related methods |
| US10769877B2 (en) | 2017-03-02 | 2020-09-08 | OpenPath Security Inc. | Secure handsfree proximity-based access control |
| CN106968514A (en) * | 2017-03-29 | 2017-07-21 | 歌尔科技有限公司 | A kind of intelligent door lock |
| CN109281545A (en) * | 2017-07-19 | 2019-01-29 | 雅帝科技股份有限公司 | Electronic lock easy to operate |
| JP6931794B2 (en) | 2017-07-19 | 2021-09-08 | パナソニックIpマネジメント株式会社 | Drowsiness estimation device and awakening guidance device |
| US10557300B2 (en) * | 2017-07-19 | 2020-02-11 | Amesbury Group, Inc. | Garage door access remote |
| US10599826B2 (en) | 2017-09-05 | 2020-03-24 | OpenPath Security Inc. | Decoupled authorization for restricted resource access |
| US10445956B2 (en) | 2017-09-05 | 2019-10-15 | OpenPath Security Inc. | Access control reader for secure handsfree access with mobile devices |
| US12047385B2 (en) | 2022-05-09 | 2024-07-23 | T-Mobile Usa, Inc. | Interoperable unlocking technology for wireless devices |
| US20240331469A1 (en) * | 2023-02-22 | 2024-10-03 | Jonathan Moshe | Method for Restricting Access to Rented Astronomical Equipment |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20100201482A1 (en) * | 2009-02-10 | 2010-08-12 | William Benjamin Robertson | System and method for accessing a structure using a mobile device |
| US20110065391A1 (en) * | 2008-05-27 | 2011-03-17 | Akihiko Shiotsuki | Wireless communication apparatus for changing directional pattern of variable directivity antenna according to variations in radio wave propagation enviroment |
Family Cites Families (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH0688461A (en) * | 1992-09-07 | 1994-03-29 | Tokai Rika Co Ltd | Antenna for electric wave key receiver |
| CA2324679A1 (en) * | 2000-10-26 | 2002-04-26 | Lochisle Inc. | Method and system for physical access control using wireless connection to a network |
| US8462994B2 (en) * | 2001-01-10 | 2013-06-11 | Random Biometrics, Llc | Methods and systems for providing enhanced security over, while also facilitating access through, secured points of entry |
| JP2003315476A (en) * | 2002-04-24 | 2003-11-06 | Seiko Epson Corp | clock |
| JP4510474B2 (en) * | 2004-01-20 | 2010-07-21 | 株式会社東海理化電機製作所 | Entrance / exit management system |
| US7446644B2 (en) * | 2005-01-14 | 2008-11-04 | Secureall Corporation | Universal hands free key and lock system |
| JP2006219925A (en) * | 2005-02-14 | 2006-08-24 | Matsushita Electric Ind Co Ltd | Lock control device, lock control system, and program |
| US20090289873A1 (en) * | 2007-12-19 | 2009-11-26 | Robert Schilling | Object direction indication through the use of multiple antenna beams |
| AU2008347260B2 (en) * | 2007-12-31 | 2013-11-28 | Schlage Lock Company | Method and system for remotely controlling access to an access point |
| JP2010101711A (en) * | 2008-10-22 | 2010-05-06 | Rcs:Kk | Guidance support system for pedestrian |
| JP5177684B2 (en) * | 2009-03-13 | 2013-04-03 | オムロンオートモーティブエレクトロニクス株式会社 | Vehicle communication apparatus and method, and program |
-
2012
- 2012-06-15 AU AU2012271443A patent/AU2012271443B2/en not_active Ceased
- 2012-06-15 JP JP2014516036A patent/JP6552195B2/en not_active Expired - Fee Related
- 2012-06-15 EP EP12799757.5A patent/EP2721871B1/en not_active Not-in-force
- 2012-06-15 CA CA2845510A patent/CA2845510A1/en not_active Abandoned
- 2012-06-15 ES ES12799757T patent/ES2813355T3/en active Active
- 2012-06-15 WO PCT/US2012/042683 patent/WO2012174387A2/en not_active Ceased
-
2013
- 2013-12-13 US US14/105,279 patent/US20140125453A1/en not_active Abandoned
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20110065391A1 (en) * | 2008-05-27 | 2011-03-17 | Akihiko Shiotsuki | Wireless communication apparatus for changing directional pattern of variable directivity antenna according to variations in radio wave propagation enviroment |
| US20100201482A1 (en) * | 2009-02-10 | 2010-08-12 | William Benjamin Robertson | System and method for accessing a structure using a mobile device |
Also Published As
| Publication number | Publication date |
|---|---|
| EP2721871A2 (en) | 2014-04-23 |
| JP6552195B2 (en) | 2019-07-31 |
| ES2813355T3 (en) | 2021-03-23 |
| US20140125453A1 (en) | 2014-05-08 |
| AU2012271443A1 (en) | 2014-02-06 |
| WO2012174387A3 (en) | 2013-02-21 |
| JP2014522924A (en) | 2014-09-08 |
| EP2721871B1 (en) | 2020-08-12 |
| CA2845510A1 (en) | 2012-12-20 |
| EP2721871A4 (en) | 2015-03-18 |
| WO2012174387A2 (en) | 2012-12-20 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| AU2012271443B2 (en) | System and method for accessing a structure using directional antennas and a wireless token | |
| US9501884B2 (en) | System and method for accessing a structure using directional antennas and a wireless token | |
| US9361741B2 (en) | System and method for accessing a structure using a mobile device | |
| US9336635B2 (en) | System and method for permitting secure access to a structure | |
| US9367975B2 (en) | System for permitting secure access to a restricted area | |
| US10085135B2 (en) | Radio frequency patch antenna and system for permitting secure access to a restricted area | |
| US9558604B2 (en) | System for permitting secure access to a restricted area | |
| US20100201536A1 (en) | System and method for accessing a structure using a mobile device | |
| US12205429B2 (en) | Biometric enabled access control | |
| EP3528214B1 (en) | Method for selectively opening a second lock from a first lock using short-range communications (src) | |
| US20190325677A1 (en) | Home security system with automatic authorization functionality | |
| CN110612556B (en) | Access control system with wireless communication | |
| US20220130190A1 (en) | Systems and methods for premises access control | |
| EP3965076A1 (en) | Method of controlling access | |
| EP3561789A1 (en) | Improved home security system with automatic authorization functionality | |
| HK1165651B (en) | A system and method for accessing a structure using a mobile device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PC1 | Assignment before grant (sect. 113) |
Owner name: YIKES, LLC Free format text: FORMER APPLICANT(S): YIKES CORPORATION |
|
| FGA | Letters patent sealed or granted (standard patent) | ||
| MK14 | Patent ceased section 143(a) (annual fees not paid) or expired |